From 5034df7f364a7bc1f451150012ffb811b66f1a9e Mon Sep 17 00:00:00 2001 From: Jack Lloyd Date: Wed, 5 Sep 2018 09:16:39 -0400 Subject: Update docs --- doc/manual/rng.rst | 13 +++++-------- 1 file changed, 5 insertions(+), 8 deletions(-) diff --git a/doc/manual/rng.rst b/doc/manual/rng.rst index 1828cc8b8..b8549e9bc 100644 --- a/doc/manual/rng.rst +++ b/doc/manual/rng.rst @@ -233,14 +233,11 @@ and entropy. The following entropy sources are currently used: - * System RNG. This is simply however the system RNG is implemented on the - current system (arc4random, reading /dev/urandom, or RtlGenRandom). - * RDRAND: is used if available, but not counted as contributing entropy - * RDSEED: is used if available, but not counted as contributing entropy - * Darwin SecRandomCopyBytes. This may be redundant with the system RNG - * /dev/random and /dev/urandom. This may be redundant with the system RNG - * getentropy, only used on OpenBSD currently - * /proc walk: read files in /proc. Last ditch protection against + * The system RNG (``arc4random``, ``/dev/urandom``, or ``RtlGenRandom``). + * RDRAND and RSEED are used if available, but not counted as contributing entropy + * ``/dev/random`` and ``/dev/urandom``. This may be redundant with the system RNG + * ``getentropy``, only used on OpenBSD currently + * ``/proc`` walk: read files in ``/proc``. Last ditch protection against flawed system RNG. * Win32 stats: takes snapshot of current system processes. Last ditch protection against flawed system RNG. -- cgit v1.2.3